Click here to Skip to main content
15,920,606 members
Articles / Programming Languages / Python

Bypassing ASLR and DEP - Getting Shells with pwntools

Rate me:
Please Sign up or sign in to vote.
0.00/5 (No votes)
13 Aug 2019CPOL6 min read 6K   3  
A short trick to bypass both ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention) in order to obtain a shell in a buffer-overflow vulnerable binary

Views

Daily Counts

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
Student
Romania Romania
Master's student @ ACS / UPB (Advanced Cybersecurity), Graduate Teaching Assistant, Junior Security Researcher. Also, webmaster of coding.vision

Comments and Discussions